botnetzero-dayIoTidentitytheftBECbreachDDoSriskspywaresocialengineeringCyberSecurityWISPVPNhackersmishingFTPDefense-in-depthencryptionantivirusresilienceconfidentialitynetworkescalationsecurityawarenessOSpentestPHIbusinesscontinuityIPwormavailabilityIDSinsiderthreatIPSriskassessmentbugvulnerabilitydefenseevasionIOCvishingincidentmalwareintegrityincidentresponsecyberattackPIIexploitpassphraseHIPAApasswordDarkWebspoofingfirewallcompliancephishingsecuritypolicyCIAtriadpackettrainingcryptographyvirusspamMFAadminProofpointrootkitSecurityOperationsAPTCyberDefenseSyssecAdminransomwareEDRbotnetzero-dayIoTidentitytheftBECbreachDDoSriskspywaresocialengineeringCyberSecurityWISPVPNhackersmishingFTPDefense-in-depthencryptionantivirusresilienceconfidentialitynetworkescalationsecurityawarenessOSpentestPHIbusinesscontinuityIPwormavailabilityIDSinsiderthreatIPSriskassessmentbugvulnerabilitydefenseevasionIOCvishingincidentmalwareintegrityincidentresponsecyberattackPIIexploitpassphraseHIPAApasswordDarkWebspoofingfirewallcompliancephishingsecuritypolicyCIAtriadpackettrainingcryptographyvirusspamMFAadminProofpointrootkitSecurityOperationsAPTCyberDefenseSyssecAdminransomwareEDR

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
  1. botnet
  2. zero-day
  3. IoT
  4. identity theft
  5. BEC
  6. breach
  7. DDoS
  8. risk
  9. spyware
  10. social engineering
  11. Cyber Security
  12. WISP
  13. VPN
  14. hacker
  15. smishing
  16. FTP
  17. Defense-in-depth
  18. encryption
  19. antivirus
  20. resilience
  21. confidentiality
  22. network
  23. escalation
  24. security awareness
  25. OS
  26. pentest
  27. PHI
  28. business continuity
  29. IP
  30. worm
  31. availability
  32. IDS
  33. insider threat
  34. IPS
  35. risk assessment
  36. bug
  37. vulnerability
  38. defense evasion
  39. IOC
  40. vishing
  41. incident
  42. malware
  43. integrity
  44. incident response
  45. cyber attack
  46. PII
  47. exploit
  48. passphrase
  49. HIPAA
  50. password
  51. Dark Web
  52. spoofing
  53. firewall
  54. compliance
  55. phishing
  56. security policy
  57. CIA triad
  58. packet
  59. training
  60. cryptography
  61. virus
  62. spam
  63. MFA
  64. admin
  65. Proofpoint
  66. rootkit
  67. Security Operations
  68. APT
  69. Cyber Defense
  70. SyssecAdmin
  71. ransomware
  72. EDR